____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.?

A. ?Symmetric keys
B. ?Symmetric encryption algorithms
C. ?Digital signatures
D. ?SMTP and IMAP

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following actions requires a high level of computer performance?

A) creating text files B) printing graphics files C) viewing clipart files D) creating video files

Computer Science & Information Technology

The expression intX ________ intY yields the remainder after intX is divided by intY.

a) Mod b) % c) * d) /

Computer Science & Information Technology